Video content analysis
BrainChip Holdings Ltd, global developer of software and hardware accelerated solutions for advanced artificial intelligence (AI) and machine learning applications, has signed a strategic partnership agreement with SoftCryptum to sell BrainChip’s AI-powered video analytics solutions to government agencies in France, Belgium, and Switzerland. BrainChip-SoftCryptum Strategic Partnership SoftCryptum sells security and data analytical solutions around the world, particularly to govern...
We’re here again. The end of another calendar year, and a time when many organizations are assessing their performance over the past 12 months and finalizing strategic plans for 2019. Taking time to reflect on where our industry is at – and what’s likely to happen in the future – is important for all organizations as they set out their long-term goals and tactics. Here are some of the key trends to watch in the months to come and some predictions on their potential to i...
Created more than 20 years ago, the French firm COSSILYS21 offers intelligent video-protection solutions. It equips major national banks, numerous regional banks, as well as shops. The COSSILYS21 firm is nowadays a reference in the banking sector. COSSILYS21 and FOXSTREAM have established a strong partnership for several years. When Mister Alain Ghaye, CEO and main shareholder of COSSILYS21, decided to hand over its firm to retire, the idea of bringing closer the two firms naturally made its wa...
Schools are continuing to upgrade security measures for pupil safety. However, on top of all the fundamental challenges schools face, implementing well-rounded and effective security solutions can seem a great difficulty. Andrew Shaw, architectural consultant for Allegion UK, discusses the advantages of electro-mechanical solutions. Schools can equate to some of the most complex security challenges for architects, specifiers and school officials alike. This is because choosing the right solutio...
BriefCam, the provider of Video Synopsis and Deep Learning solutions, announced that it will demonstrate the BriefCam v5.2.1 video content analytics platform at the Global Security Exchange (GSX) Security Conference & Expo in Las Vegas. BriefCam’s Integration Technology BriefCam’s breakthrough technology detects, tracks, extracts and identifies people and objects from video, including; men, women, children, clothing, bags, vehicles, animals, size, color, speed, path, direction,...
By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...
MOBOTIX is expanding its management team to include two new members. Following a successful restructuring, MOBOTIX is paving the way for sustainable growth with its new members, both experienced industry experts: Christiane Kampling will now serve as Head of Marketing & Corporate Communications and Hartmut Sprave as Chief Technical Officer. Both started with the company on June 1st, 2018. Christiane Kampling is taking over as Head of Marketing and Corporate Communications at MOBOTIX. She has held similar positions over the past few years at Covestro, Xchanging Continental Europe, and ING Investment Management. Kampling was also able to gather valuable insights as Marketing Director at Dell. In these positions, Kampling, who holds a degree in business, was responsible for business opportunities and implementing entire marketing strategies (B2B and B2C). She was also in charge of developing new go-to-market models for SMEs and end users as well as building business opportunities through strategic partnerships and cooperations. In addition, Kampling managed the media, PR, and advertising agencies as well as events and roadshows. Digital Video Technology Expert As member of the Management Board and new Chief Technical Officer of the Technology Department, Hartmut Sprave is responsible for hardware, software, product management, quality management and strategic innovation at MOBOTIX. Sprave, who holds a degree in physics, previously served as Vice President Software at Loewe Technologies GmbH, where he was responsible for software development at numerous sites in Germany and abroad. As co-founder and CTO of MacroSystem Digital Video GmbH, he gained extensive experience in the area of digital video technology. “Christiane Kampling and Hartmut Sprave are both highly qualified experts, and we are pleased to welcome them to the MOBOTIX team,” says Thomas Lausten, Chief Executive Officer at MOBOTIX. “With our strong new Management Team, we are perfectly prepared for any upcoming challenge.”
Panopto, a video platform provider for businesses and universities, and Matrox Graphics Inc., a global manufacturer of reliable, high-quality encoder cards, appliances, and software, announced the forthcoming release of a new Panopto-certified media capture appliance. Purpose-built for the Panopto video platform, the new Matrox Maevex 6020 Remote Recorder supports best-in-class video recording and live streaming in a compact, turnkey form factor. In recent years, businesses and universities have expanded their AV infrastructure to provide video recording and streaming capabilities in more classrooms and conference rooms. To scale effectively, these organizations increasingly require video capture solutions that can be installed easily by in-house staff and that take up minimal space in the room. With a compact form factor, low power usage, and whisper-quiet operation, the appliance is ideal for broadcast-quality video recording and streaming at an affordable price point Broadcast-quality Video Recording In response to this growing demand, Panopto and Matrox Graphics engineering teams jointly developed the Maevex 6020. With a compact form factor, low power usage, and whisper-quiet operation, the appliance is ideal for organizations looking for broadcast-quality video recording and streaming at an affordable price point. By simply connecting the appliance to the network and plugging in video sources, businesses and universities can: Capture live and on-demand video: An intuitive, web-based dashboard enables the scheduling of video recordings and live broadcasts from anywhere. Customers can also control, schedule and monitor recordings from their phone using the Remote Control capability in Panopto for iOS and Android. Share videos to any device: All videos captured by the Maevex 6020 are automatically published to Panopto's video content management system, where they're encoded for on-demand playback on any device. Search inside videos: Panopto's unique Smart Search technology enables users to search inside videos and fast-forward to any word spoken or shown. The appliance enables organizations to automate the capture and streaming of presentations, lectures, meetings and events Automating Capturing And Streaming The appliance is built for simple operation with no extraneous features. It provides presenters with a visual indicator of the current recording state, and one-touch controls to start, stop, and pause recordings. In addition, the appliance enables organizations to automate the capture and streaming of presentations, lectures, meetings and events. It supports the scheduling of one-time and recurring events, remote configuration of recording devices, and previews of video feeds and audio histograms. "Every classroom, conference room, and auditorium has unique logistical requirements, and we built Panopto to support infinite customization of the AV infrastructure in these learning spaces," said Eric Burns, co-founder and CEO of Panopto. "Regardless of the form factor or use case, our goal is to provide a best-in-class video capture solution. Through our partnership with Matrox, we're taking the next logical step in this strategy, working with an industry leader to provide a sleek, compact device that has the power and reliability of larger appliances at an affordable price point." Multi-channel Encoding Solution "Maevex technology is the latest in Matrox's line of realtime, multi-channel encoding solutions for the enterprise and education markets," said David Chiappini, vice president of research and development at Matrox Graphics Inc. "When you combine the performance and ease-of-use of this technology with Panopto's video management and search capabilities, you get an industry-leading, end-to-end solution for video-based communications and learning in the cloud or on-premises." The Maevex 6020 remote recorder will be released this fall with full pricing details coming later this summer.
BriefCam, global provider of Video Synopsis and Deep Learning solutions, has announced v5 (version 5) of its breakthrough video content analytics platform. BriefCam’s platform is built on a unique fusion of Computer Vision and Artificial Intelligence (AI) technologies, spawning new and innovative opportunities to turn video footage into an essential asset. BriefCam’s platform is built on a unique fusion of Computer Vision and Artificial Intelligence (AI) technologies BriefCam v5 introduces new capabilities across all three of the platform's seamlessly integrated modules, delivering a powerful approach to making video searchable, actionable and quantifiable. The new version enables customers to rapidly realize both the security and business value that their surveillance system can provide by innovatively harnessing the process-once-use-many paradigm throughout the platform. BriefCam v5 Video Analytics Platform “Following the significant migration from analog to IP cameras and the investment in video surveillance management systems, organizations are now looking how to extract the most value from their surveillance systems,” said BriefCam partner, Jordan Heilweil the Founder of Total Recall, a Convergint Technologies Company. “BriefCam’s customers outpace suspects and meet complex business challenges by reviewing hours of video in minutes, pinpointing objects of interest, extracting quantifiable insights from video data and transforming their organizations into proactive enterprises.” Architected exclusively for GPU-based processing, BriefCam v5 exponentially increases video processing efficiency, delivering 4x faster processing than v4 Architected exclusively for GPU-based processing, BriefCam v5 exponentially increases video processing efficiency, delivering 4x faster processing than v4. Key new features include: Rapid Review & Search Addition of semantic detection for increased object extraction quality, and support for searching video by nine new object classes and eight new attributes Multi-camera search rapidly pinpoints objects across any number of cameras, while close-up clips enable immediate viewing of the object of interest with back-to-original video support Face recognition and appearance similarity extend BriefCam’s rapid search capabilities, while Case Management and Investigation Reports streamline investigator workflow Quantitative Research & Planning Comprehensive Business Intelligence platform dynamically trends and visualizes key performance indicators derived from extracted video objects and their classification Out-of-the-box, easily customizable, report library addresses multiple use cases for verticals such as law enforcement, transportation and retail, while supporting rapid creation of new dashboards for different stakeholders and personas Scheduled, continuous and file-based processing provides support for a wide variety of different video sources Proactive Response Customizable smart-alerts leverage the advanced analytics capabilities of the platform, providing near real-time notification of safety, security and operational events Powerful and easy to use wizard enables complex alert rule creation and editing Save and re-load capabilities of alert rules and filters enables quick reproduction of findings across all modules “By harnessing deep learning, parallel processing, and data science technologies to advance our previous breakthroughs using computer vision, we are transforming how organizations utilize video surveillance footage to be more productive, proactive, and predictive,” said Trevor Matz, BriefCam president and CEO. “The availability of BriefCam v5 allows for crimes to be solved faster, cities to be safer and for companies to serve customers better.” BriefCam will demonstrate the functionality of its new v5 platform at ISC West 2018 in booth #31086.
Panasonic System Solutions Company of North America will showcase its latest innovations and a diversified technology portfolio of end-to-end security and evidence management solutions at ISC West 2018 Booth 10037, April 11-13, at the Sands Expo & Convention Center in Las Vegas. Expanding upon the broad collection of fixed, mobile and body-worn hardware and software surveillance platforms unveiled late last year, Panasonic will exhibit a collection of highly-integrated products and services to easily connect and manage the fast-changing security industry. New products include FacePRO facial recognition software with deep learning technology; the new Video Insight VI 7.2 VMS; the i-PRO EXTREME 33MP (4x4K) Multi-Sensor camera; the i-PRO EXTREME 9 Megapixel 360 degree dome camera series; and the i-PRO EXTREME 5 Megapixel Fixed camera series. ISC West serves as an important platform to show the significant investment Panasonic has made in security technology" Unified Security Management Solutions “ISC West serves as an important platform to show the significant investment Panasonic has made in security technology to provide integrated solutions that are easy to use across numerous key vertical markets including education, public safety, and transportation,” said M. Faisal Pandit, SVP and Chief Digital Officer, Panasonic System Solutions Company of North America. “We are committed to delivering comprehensive, turnkey, video surveillance hardware and software solutions that work together to keep cities, schools, and our communities safe.” This year the new Unified Security Management Solutions exhibit demonstrates Panasonic’s VI 7 VMS Solution, MonitorCast Access Control, Transportation Solution and Advidia Cameras. The Unified Public Safety area demos body-worn-cameras, UEMS (Unified Evidence Management System) and the new FacePRO high-precision facial recognition software with deep learning technology. The new I-PRO Extreme Products display showcases FacePRO facial recognition software and its integration with the new i-PRO EXTREME line of cameras (Multi-Sensor, 9 Megapixel 360, and 5 Megapixel camera series), as well as the cameras themselves, and a new NVR. The Strategic Partner Zone includes v5 systems a portable outdoor security solution, Optex an intrusion detection security demo and integration between Genetec / FacePRO. FacePRO high-precision facial recognition software can identify faces that are difficult to recognise with conventional technologies Showcase Details Details on the Panasonic technology and solutions to be showcased in ISC West Booth 10037 include: New FacePRO Facial Recognition – Featuring a “deep learning” core engine that boasts the world’s highest face recognition performance, FacePRO high-precision facial recognition software can identify faces that are difficult to recognize with conventional technologies, including faces at an angle of up to 45 degrees to the left or right or 30 degrees up or down, and those partially hidden by sunglasses. FacePRO even works better with the feature "iA (intelligent Auto) mode" that camera automatically adjusts settings to shoot optimal images best suited for facial recognition. When used with Panasonic's i-PRO EXTREME series network cameras installed with “Best Shot feature,” only the “best shots” will be sent to the server for face recognition. Using FacePRO with cameras equipped with the iA function enables image analysis to be performed on the camera instead of the server. As a result, only the best images are sent, reducing server and network load and total system cost. Video Insight VI 7.2 Video Management Software – An integral component of any school or city safety solution is video surveillance management. Video Insight VI 7.2 is the latest generation of VI’s open-platform VMS and is faster and is reimagined from the ground up to be more intuitive, easy, and powerful, while offering new premium functionality for key vertical markets: Panasonic Body-Worn Camera Support – Ability to connect to Panasonic body-worn cameras and can transfer video and audio to VI MonitorPlus. The new i-Pro EXTREME Multi-Sensor cameras deliver extreme image quality for evidence capturing Vehicle Incident Detection (VID) – Capture and highlight video of stopped and wrong-way vehicles. Transportation Functionality – Transfer and review video and audio from Panasonic body-worn cameras. LPR License Plate Recognition (LPR) Plug-in – Integrate with LPR cameras to capture, monitor, and review video associated with recognized license plates. FacePRO Integration Plug-In – Detect registered faces and retrieve recorded snapshots and associated video. Panasonic NVR Integration – Ability to connect Panasonic NVRs and cameras for live and recorded video. New i-Pro EXTREME H.265 Multi-Sensor Camera – WV-X8570N, WV-S8530NThe new i-Pro EXTREME Multi-Sensor cameras deliver extreme image quality – 4x4K (33 MP), 3840x2160, 15 FPS – for evidence capturing under the most challenging of conditions which makes it perfect for use in safe city and traffic applications. i-Pro EXTREME Multi-Sensor cameras have four repositionable lenses, 4K image sensors, offer sharp and clear images of fast moving vehicles with iA (intelligent Auto) and ClearSight Coating. Durable, with outstanding low light performance, the i-ProEXTREME Multi-Sensor is an excellent choice for nighttime applications. H.265 compression with new smart coding, self-learning ROI (Region of Interest), and the highest in data security make the i-Pro EXTREME Multi-Sensor a technologically superior line of video surveillance cameras. The i-Pro EXTREME 9 MP 360 video surveillance cameras are perfect for transportation, retail, logistics, campus, city and healthcare applications New i-Pro EXTREME H.265 9 MP 360 Degree Camera – WV-X4571LM, WV-X4571L, WV-X4171, WV-X4170The i-Pro EXTREME 9 MP 360 line of video surveillance cameras is perfect for transportation, retail, logistics, campus, city and healthcare applications. With a clearer – and less distorted – image of faces and objects near the edge of the fisheye, the camera provides 9 megapixel fisheye images up to 30 FPS and instantly responds to sudden light changes. It also has Auto Shutter speed control for fast moving objects, Super Dynamic 108dB for backlit situations and shadows, and built-in IR LED for clarity in zero lux conditions (*). H.265 compression with new smart coding, self-learning ROI (Region of Interest), and the highest in data security encryption make the i-Pro EXTREME 9 MP 360 camera a technologically superior line of video surveillance cameras. (*IR LED is outdoor models only) New i-Pro EXTREME H.265 5 MP Fixed Camera – WV-S2550L, WV-S2250L, WV-S1550LPerfect for safe cities and campuses, as well as for transportation, retail and finance implementations, the new i-Pro EXTREME 5 MP fixed camera line offers Auto Shutter speed control for moving vehicles, sharp images of a person walking in daylight or at night, outstanding low light performance, and Super Dynamic 120dB for backlit situations including headlights or shadows on streets. With 5 megapixel images up to 30 FPS, efficient H.265 compression provides longer recording and less storage compared to any other H.264 techniques. New self-learning ROI (Region of Interest) detects movement within an image and compresses areas with little motion to reduce transmitted data while maintaining the quality of the image. Full end-to-end system encryption with i-PRO EXTREME Recorder and devices provide protection from IP snooping, IP spoofing, and data alteration.
Matrox® Graphics Inc. and fellow Secure Reliable Transport (SRT) Alliance member, LiveScale, are pleased to announce a new end-to-end, AV-over-IP system to seamlessly stream high-quality 4K content to any location. The industry-renowned Matrox Maevex 6150 quad 4K enterprise encoder appliances capture, encode, and stream up to four 4K signals from any source to the cloud-based LiveScale omnicast platform for live video publishing and delivery to web, mobile, broadcast, and social media destinations—including Facebook, YouTube, and Twitter. As members of the SRT Alliance, users will also benefit from an optimized video-transport protocol developed specifically for modern network and security requirements. The Matrox and LiveScale pairing represents a comprehensive, yet simple, 4K video workflow option for any streaming media ecosystem. This collaboration provides organizations to reach and engage all audiences with 4K content at high quality and low latency High-Quality 4K Content “Matrox and LiveScale have now made high-volume 4K video transmission, in one word, simple,” says Samuel Recine, director of sales – Americas Asia Pacific, Matrox Graphics Inc. “By providing secure and reliable mass 4K delivery capability, this collaboration provides organizations with the ability to reach and engage all audiences with 4K content at high quality and low latency.” “The Maevex 6150 combined with LiveScale is the answer to major concerns in the industry,” says Virgile Ollivier, CoFounder & CEO, Livescale Technologies Inc. “Reaching any type of audience, on any network and device with the best quality of experience, is a must-have for all content producers.” Improving ROI On Live Content Distribution The Maevex 6150 appliance allows for the simultaneous capture, streaming, and recording of up to four 4K inputs. This powerful all-in-one appliance can feed on-premises and cloud-based servers to reach internet viewers, push many streams over LAN for local audiences, and record to local or network storage for later editing and viewing, concurrently. First cloud-based omnicast platform for live video, LiveScale allows content creators to reach fragmented audiences, with optimized video quality on any outlet and improved ROI on live content distribution. With a unique cloud-designed approach, LiveScale deploys dedicated end-to-end live video workflow—from content ingest to realtime analytics—within two minutes, without any technical requirement.
BeyondTrust, global cyber security company dedicated to preventing privilege abuse and stopping unauthorized access, announced that it has been named a leader in The Forrester WaveTM: Vulnerability Risk Management, Q1 2018 report. According to the report, “BeyondTrust supports a robust set of features at an incredible price point.” Researchers added, “If you’re looking for a cost-effective solution for scanning your infrastructure with risk and compliance reporting, this is an excellent choice.” Risk Management And Data Analysis The Forrester Wave is an evaluation of vendors in the software, hardware, or services markets, driven by the analysis of data collected from the marketplace. In the 22-criteria evaluation of the 12 most significant vulnerability risk management providers, Forrester analysts researched, analyzed and scored each participant. The report shows how each provider measures up and helps security and risk (S&R) professionals make the right choice. According to the Forrester Wave, all vendors included in the report met the following inclusion criteria: Remediation prioritization based on threat intelligence, substantial enterprise level experience and significant mindshare with Forrester clients. The Forrester Wave evaluation gave BeyondTrust the highest scores possible for the following evaluation criteria: Endpoint agent integration Total cost of ownership Product Roadmap “We believe the results from this report underscore BeyondTrust’s strengths of offering tremendous value for the price,” said Kevin Hickey, CEO of BeyondTrust. “We believe this report demonstrates third-party recognition for delivering a well-developed, forward looking solution to meet tomorrow’s needs.”
There’s no denying that cyber-crime is one of the biggest threats facing any organization with the devastating results they can cause painfully explicit. Highly publicized cases stretching from the US government to digital giant Facebook has made tackling cyber security a necessity for all major organizations. The consequences of breaches have just become more severe, with new GDPR rules meaning any security breach, and resultant data loss, could cost your organization a fine of up to four per cent of global revenue or up to 20 million euros. Cyber-crime potentially affects every connected network device. In the biggest cyber-crime to date, hackers stole $1 billion from banks around the world, by gaining access to security systems. It’s more important than ever for organizations to be vigilant when it comes to their cyber security strategy. To help avoid becoming the next victim, I’ve put together a five-point cyber plan to protect your video surveillance system. 1. Elimination Of Default Passwords A small change to a memorable, complex password could have huge consequences for your business It is estimated that over 73,000 security cameras are available to view online right now due to default passwords. ‘Password’ and ‘123456’ are among the top five most popular passwords with a staggering 9,000,000 login details matching this description. Guessable passwords create an unsecure security system which can result in an easy way for hackers to gain access to your organization’s data, making you vulnerable to a breach. A small change to a memorable, complex password could have huge consequences for your business. Removing default passwords from products and software forces individuals to think of their own to keep their data safe. If a password system is not provided by your organization we recommend that your password uses two or more types of characters (letters, numbers, symbols) and it is changed periodically. 2. Encrypted Firmware Encrypting firmware is an important part of any organizations overall security system. Firmware can leave an open door, allowing hackers to access your data. All firmware should be encrypted to reduce the possibilities of it being downloaded from the manufacturers website and deconstructed. If the firmware posted is not encrypted, there is a risk of it being analyzed by persons with malicious intent, vulnerabilities being detected, and attacks being made. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis There have been cases where a device is attacked by firmware vulnerabilities even if there are no problems with the user's settings, rendering it inoperable, and DDoS attacks being made on other servers via the device. With i-PRO cameras and recorders, all firmware is securely encrypted to mitigate analysis. There is also a possibility of being attracted to spoofing sites by targeted attack email and firmware being updated with a version that includes a virus, so firmware must always be downloaded from the vendor's page. It may also be advantageous to combine this with an imbedded Linux operating system which removes all unused features of the device, it can help to reduce the chances of malicious entities searching for backdoor entities and inserting codes. 3. Removing Vulnerabilities Within The Operating Systems Vulnerability is the name given for a functional behavior of a product or online service that violates an implicit or explicit security policy. Vulnerabilities can occur for a number of reasons for example, due to an omission in logic, coding errors or a process failure. Network attacks exploit vulnerabilities in software coding that maybe unknown to you and the equipment provider. The vulnerability can be exploited by hackers before the vendor becomes aware. You should seek to minimize these issues by looking for a secure operating system which is regularly updated. Panasonic has developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping As a provider of security solutions, Panasonic is taking a number of steps to ensure its consumers remain safe and secure. We have developed Secure Communications, a platform and package to protect against video tampering, altering, spoofing and snooping. We have combined with a leading provider of highly reliable certificates and technology for detecting and analyzing cyber-attacks with its own in-house embedded cryptography technology, to provide a highly secure and robust protection layer for its embedded surveillance products. 4. Avoiding Remote Login Using Telnet Or FTP Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures Telnet and FTP are a very outdated source of software which as a result means they lack built-in security measures. File transfer protocol or transfer through cloud-based services means the files and passwords are not encrypted and can therefore be easily intercepted by hackers. An encrypted software removes the risk of files being sent to the wrong person or forwarded on without your knowledge. Telnet predates FTP and as a result is even less secure. Hyper Transfer Protocol Secure is a protocol to make secure communications by HTTP, and it makes HTTP communications on secure connections provided by SSL/TLS protocols. The major benefits of using this system is that HTTPS and VPN encrypt the communications path, so data after communications is decrypted and recorded. If recorded data is leaked, it will be in a state where it can be viewed. With data encryption, however, it remains secure and can even be recoded to storage. Thus, even if the hard drive or SD card is stolen or data on the cloud is leaked, data cannot be viewed. 5. Use Of Digital Certificates Private and public keys are generated at manufacture in the factory and certificates installed at the factory Digital certificates are intended to safely store the public key and the owner information of the private key it is paired with. It provides assurance that the accredited data from a third party is true and that the data is not falsified. It is beneficial for all data to be encrypted with digital certificates. Digital certificates are far safer when issued by a third party rather than creating a self-signed version unless you are 100 percent sure of the receiver identity. From April 2016, some models of Panasonic series iPro cameras come with preinstalled certificates to reduce the risk of interception and the hassle of having to create one. With i-PRO cameras with Secure function, private and public keys are generated at manufacture in the factory and certificates installed at the factory. As there is no way to obtain the private key from the camera externally, there is no risk of the private key being leaked. Also, certificates are signed by a trusted third party, and the private key used for signing is managed strictly by the authority. In addition, encryption has been cleverly implemented to reduce the usual overhead on the IP stream from 20% to 2%.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
The Internet of Things (IoT) is having a significant and ever-changing impact on the way we view video security. Today, cameras are expected to be so much more than devices with which to simply capture images; they need to be far smarter than that. These future-facing cameras are becoming an integral part of the vast digital connectivity infrastructure, delivering a parallel performance as intelligent sensors with the ability to extract the kind of invaluable data that helps businesses make improvements in the area of video security, and beyond. However, as the list of possibilities grows, so too does the risk of unauthorized access by cybercriminals. We should all be aware that a single weak link in a communications infrastructure can give hackers access to sensitive data. That’s the bad news. Safeguarding Data And Utilizing Deep Learning The good news is cybercrime can be avoided by employing a data security system that’s completely effective from end-to-end. One technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’ Once this level of safeguarding is in place you can begin to confidently explore the technologies and trends happening now, and those on the horizon. So, what will be having an influence on surveillance in 2018? Well, according to IHS Markit, one technological advancement that the trend-spotters are predicting will become part of the video security vocabulary is ‘deep learning’, which uses algorithms to produce multiple layers of information from the same piece of data, therefore emulating the way the human brain absorbs innumerable details every second. In Europe, GDPR compliance will also be a big talking point as new principles for video surveillance data collection, use limitation, security safeguards, individual participation and accountability are introduced. And, as the popularity – and misuse – of drones continues to rise, the recent developments in drone detection technology will be particularly welcomed by those whose primary concern relates to large areas, such as airport perimeter security. The Future Of 'Smart' Video Analytics An important feature of today’s intelligent cameras is the ability to provide smart video analytics. The Bosch ‘i’ series, for example, offers a choice of formats – Essential Video Analytics and Intelligent Video Analytics. Essential Video Analytics is geared toward regular applications such as small and medium businesses looking to support business intelligence (e.g. inter-network data transfer), large retail stores and commercial buildings for advanced intrusion detection, enforcing health and safety regulations (no-parking zones or detecting blocked emergency exits) and analyzing consumer behavior. The camera-based, real-time processing can also be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Intelligent Video Analytics provides additional capabilities. It is designed for demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). An important feature of today’s intelligent cameras is the ability to provide smart video analytics Intelligent Video Analytics can also differentiate between genuine security events and known false triggers, such as challenging environments created by snow, wind (moving trees), rain, hail, and water reflections. For more expansive areas, like an airport perimeter fence, the system has the range and capability to provide analysis over large distances. And, if a moving camera is employed, it is also possible to capture data on objects in transit when used in conjunction with the Intelligent Tracking feature. For roadside use, Intelligent Video Analytics systems, such as the Bosch MIC IP range, are resistant to vibrations and can still operate in extreme weather conditions, continuing to detect objects in heavy rain or snow. Evolving Cameras Past Surveillance It’s becoming ever clearer that the IoT is transforming the security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. The capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed) With intelligent video security cameras at the core of an urban infrastructure smart data can be collected to optimize energy consumption via smart city lighting that responds to crowd detection and movement. Cameras can also be used to improve public transport by monitoring punctuality and traffic flow based on queue lengths, with the ability to control traffic lights an option should a situation require it. As the urban sprawl continues and this infrastructure grows, the need for more knowledge of its use becomes more essential, necessitating the monitoring technology developed for use by human operators to evolve into smart sensing technology, that no longer just provides video feeds, but also uses intelligent analytics and sophisticated support systems. These systems filter out irrelevant sensor data and present only meaningful events, complete with all relevant contextual data to operators to aid their decision-making. Expanding The Video Security Camera Network Today, video analytics technology has tangible benefits for human operator surveillance, and delivers KPIs that are highly relevant to transport operators, planners and city authorities. As an existing infrastructure, a video security camera network can be improved and expanded by installing additional applications rather than replaced. From a business perspective, that means greater value from a limited investment. Thereafter, the capabilities of an intelligent camera extend to the interaction and sharing of information with other devices (only those you have appointed), image and data interpretation, and the ability to perform a variety of tasks independently to optimize both your safety and business requirements. The fact is, cameras see more than sensors. Sounds obvious, but a conventional sensor will only trigger an alarm when movement is detected, whereas a camera can also provide the associated image and information like object direction, size, color, speed or type, and use time stamps to provide historical information regarding a specific location or event. Based on this evidence, the video security camera of today is more than ready for the challenges of tomorrow.
As Internet of Things (IoT) devices go, networked video cameras are particularly significant. Connected to the internet and using on-board processing, cameras are subject to infection by malware and can be targeted by Distributed Denial of Service (DDoS) attacks. Hacking of cameras also threatens privacy by allowing unauthorized access to video footage. The performance of hacked cameras can be degraded, and they may become unable to communicate properly when needed. Ensuring cybersecurity is a challenge, and the fragmented structure of the video surveillance market contributes to that challenge. A variety of companies are involved in manufacturing, integrating, installing and operating video systems, and cybersecurity threats can enter the picture at any stage. “It’s not always clear who is responsible,” says Yotam Gutman, vice president of marketing for SecuriThings, a cybersecurity company. “However, the only entities who can ensure cybersecurity are the security integrator and the service provider. They will bear the financial pain and are willing to pay for cybersecurity. An extra $1 or $2 per camera per month is not expensive.” SecuriThings’ “lightweight software agent” runs in the background of video cameras, sending information to an analytics system in the cloud IoT Device Security Management At the recent IFSEC trade show in London, SecuriThings unveiled its IoT Device Security Management (IDSM) approach to enable integrators to ensure cybersecurity. Founded in 2015, the company has around 20 employees in Tel Aviv, Israel, and operates a sales office in New York City. SecuriThings’ “lightweight software agent” runs in the background of video cameras, collecting metadata on camera processes and connections and sending information back to an analytics system in the cloud. Drag-and-drop deployment enables a camera to begin generating data within seconds and requiring only two mouse clicks. The cloud system analyzes data, pinpoints abnormalities, identifies new users, detects multiple entry attempts and tracks other camera processes to identify any cyberattacks. It monitors all devices, gateways, users and APIs to detect threats in real-time and mitigate the threats based on a pre-determined security policy. Machine learning tools also analyze more subtle activities that can indicate insider abuse. For example, a user support center can identify if cameras are being accessed improperly by employees, thus preventing insider abuse. Certified Vendor Agnostic Software SecuriThings is working with camera manufacturers and video management system (VMS) manufacturers to certify operation of its software agents with various camera models and systems. Working through integrators, such as Johnson Controls, is the fastest route to market, SecuriThings has determined. The system can be added after the fact to existing installations for immediate monitoring and remediation, or it can easily be incorporated into new systems as they are launched. “We have a strong sales team in the United States focusing on bringing the technology to more local and national integrators,” says Gutman. Certification ensures SecuriThings’ software agent can be installed in most modern camera models without negatively impacting operation; the software is vendor agnostic. Another eventual route to market is to work with camera manufacturers to install the SecuriThings software agent in cameras at the factory. In this scenario, the system can easily be “clicked on” when cameras are installed. The SecuriThings cloud system generates a dashboard that tracks system activities to identify any cybersecurity threats IoT Security Operations Center SecuriThings operation is transparent to the VMS, and the company works with VMS manufacturers to ensure the code operates seamlessly with their systems. Cloud analytics generate a dashboard that tracks system activities, and/or a managed service monitors the system and notifies customers if there is a problem. “We monitor it from our IoT Security Operations Center, a fully managed service that ensures the real-time detection and mitigation of IoT cyber-threats,” says Gutman. “We found that end-customers don’t have the manpower to monitor the system, so our experts can guide them.”Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable" A benefit for camera manufacturers is the ability of a system like SecuriThings to “level the playing field” on issues of cybersecurity, says Gutman. The approach provides a higher level of cybersecurity confidence for integrators and users, including those using cameras that have previously had cybersecurity problems such as “back door” access. SecuriThings has certified its software for use with Hikvision cameras and is in the process of certifying with Dahua, says Gutman. “Western manufacturers say their products are more secure, but we can help all camera manufacturers prove that they are just as secure,” says Gutman. “Integrators and users can log into a device and see all the activity.” Securing Connected Devices From Cyber Threats Beyond video, SecuriThings’ products target the full range of connected devices in the Internet of Things (IoT). The SecuriThings security solution enables real-time visibility and control of IoT devices deployed in massive numbers in smart cities, physical security, building automation, home entertainment and more. Video surveillance is an early focus because of market need, an opportunity to gain traction, and the critical nature of security applications. But the challenges are much broader than video surveillance. “We are seeing similar risks to other devices,” says Gutman. “Access control and cloud-based access control will be the next systems under cyberattack, and they are almost as vulnerable. If you can disable the access control system, you can cause a lot of problems.” Other connected devices that could be at risk include building automation and heating and cooling (HVAC) systems.
Ambarella is a big player in the video surveillance market, but not a familiar name to many buyers of security cameras. They don’t make cameras, but they make the computer chips inside. Founded in 2004, Ambarella began in the broadcast infrastructure encoders market and entered the market for professional security cameras in 2008. More recently, the company has also entered the market for automotive OEM solutions. Between 2005 and 2015, the company has produced a progression of advanced camera system on chips (SoCs) designed, developed and mass-produced for the consumer electronics, broadcast and IP camera markets. An SoC includes an image processor as well as capabilities to run software and provide computer vision (analytics). Development has been happening fast at Ambarella. In January, they introduced the CV22 camera SoC, combining image processing, 4K and 60fps video encoding and computer vision (video analytics) processing in a single, low-power-design chip. CVflow architecture provides DNN (deep neural network) processing required for the next generation of intelligent cameras. The even newer CV2 camera SoC, introduced in late-March, delivers up to 20 times the deep neural network performance of Ambarella's first generation CV1 chip, also with low power consumption. I caught up with Chris Day, Ambarella’s vice president of marketing and business development, at the ISC West show to find out more about the company. Q: Your company is not as well known in the industry as it should be, given its widespread impact on the market. Would you prefer otherwise? Day: I think we would prefer more visibility. If you talk to any camera maker, they know who we are. We do business with all the top-10 camera companies – Hikvision, Dahua, Avigilon, Pelco and the rest. Because we are a chip supplier, the end-customer deciding to buy a camera may not know what chip is inside. For that reason, we may not have the visibility. But if you are a camera maker, you know who we are. Typically, it takes nine months to develop a camera, longer with an intelligent camera because you are importing so much software Q: What are you hearing from your camera customers in terms of what they need, and how are they directing where you go with R&D? Day: We have become a major supplier to those companies based on years of developing image processing – wide dynamic range, low light, and similar features – as well as AVC (advanced) and HEVC (high-efficiency) video encoding. That’s the heritage of our company and why we do business with all these companies. The next treadmill is computer vision – adding the intelligence into the camera. The goal is still being best-in-class in imaging and encoding, but now being best-in-class in adding the intelligence and being able to do all those things with very low power, within the “thermal budget” of the camera. That’s the next big wave. Q: How far away is that in terms of the end-customer? How soon will he or she be able to reap the benefits? Day: By the end of 2018, or maybe next year. We’re just beginning to sample the CV22, for instance, which is the first SoC directed to security cameras. Typically, it takes nine months to develop a camera, maybe longer with an intelligent camera because you are importing so much software. So, we’re talking about the end of this year or next year. Q: Tell me about your current products and the next generation. Day: The CV22 is sampling this quarter. CV2 we announced [in late March], which is a high-performance chip. The idea is that we provide our customers with different price/performance points, so they can produce a family of cameras with different capabilities. They have the same basic software model, so someone can invest in software once and then have different performance points without completely rewriting the software. That’s key. They might have 100 software engineers developing neural networks and all the features, so if you have to recreate that at different price points, it’s a lot of work. Ambarella provides customers with different price/performance points, so they can produce a family of cameras with different capabilities Q: Historically, video analytics have over-promised and under-delivered. What would you say to a sceptical user in terms of how much confidence they should have in the next wave of products? Day: Ambarella has been in the security business for 10 years, and some of us have been in the business for 15 years. Every year I’ve been disappointed by the analytics I have seen at the ISC West show. Every year there are incremental improvements – 2 percent, 5 percent, whatever – but in general, I became a sceptic, as well. What is fundamentally different now is the neural network approach to computer vision. Even for us developing these chips: In CV1 we had a certain level of deep neural network performance. We produced CV22 in the same year with four times the performance, and then CV2 has 20 times the performance in the space of one year. That’s just at the chip level. But the neural network approach to analytics and computer vision is game changing if you look at the things you can do with it compared to traditional analytics approaches. If you look at what it’s doing in automotive and security, you will see significant development. I totally appreciate the scepticism, but I think it is completely game-changing at this point, based on the technology in the chips and based on what’s happening with neural networks. Q: What do you think the next big thing is? Day: I think the next big thing is the neural networks; it’s the intelligence in the camera. People have been pushing toward higher resolution, we’ve done 4K, we have incredible imaging even in really dark scenes. So we have been solving all those problems. And so now to add the computer vision and be able to do that in parallel with the image processing and high-resolution encoding, and all in a chip that is low-power. That’s the differentiator. Q: What else is happening? Jerome Gigot, Senior Director Marketing: There is a lot happening on the consumer side, too, with the home security market. You will see cameras in your home with more and more intelligence. Some are used for video doorbells. On some of the new cameras, we have package notification – you get notified if a package arrives, or if someone steals your package. And new battery-powered cameras are very easy to install with no wires.
Milestone Systems is embracing artificial intelligence and deep learning in a big way at this week's yearly Milestone Community Days (MIPS 2018) in Las Vegas. The Danish company's theme is "Creating an Intelligent World," and Milestone's stated goal is to make "the Milestone community part of every surveillance installation in the world." Science Fiction Becomes Reality In a presentation on opening day, Milestone CSMO Kenneth Hune Petersen pointed to the 2002 movie The Minority Report as highlighting a variety of gadgets and systems that seemed futuristic at the time but are now perfectly possible, and in some cases outdated. Movies have previously highlighted gadgets and systems that were futuristic, but are now perfectly possible, or outdated "If we dare to dream together we can make this a better world," says Petersen. "Through AI and machine learning, we can help define tomorrow. There's no doubt about it: There is a massive business opportunity for us in artificial intelligence." Despite all the talk about artificial intelligence, only about 0.5 percent of all the data in the world has currently been analyzed or used, says Peterson. "Our open platform technology is the foundation for intelligent video systems and our partners have the expertise and infrastructure needed to reach the next frontier in intelligent video solutions," said Bjørn Skou Eilertsen, Milestone Systems CTO. "Together, we can provide unlimited solutions for our customers." Deeper Integration And Broader Coverage Expanding the Milestone community this year has included the addition of 1,000 new models of supported hardware devices; there are currently more than 7,000 models supported. Milestone is also pursuing broader coverage of installations through their partners, with deeper integration of functionality, and by deepening existing relationships with customers. ‘Creating an intelligent world’ includes deep learning and lots of video systems, says Milestone at their annual conference Under new agreements, hardware partners such as Dell EMC and BCDVideo now provide XProtect Essential+ software pre-loaded on servers they sell. The focus at MIPS 2018 on AI included a presentation by Tanmay Bakshi, the "world's youngest IBM coder" and TED Talk speaker, at 14 years old. The prodigy, who has been coding since the age of 4, has worked with IBM and other companies on a variety of AI-related projects. Using deep learning with video is currently limited because so much video is unlabelled and unstructured In his MIPS 2018 keynote speech, Bakshi traced the development of AI through high-profile events, such as IBM's development of the "Watson" computer, which successfully competed on Jeopardy!, and Google's development of AlphaGo, a program that successfully plays the complex ancient board game, Go. Data Demands Deep-Learning Bakshi focused on security and healthcare as two disciplines where deep learning can potentially have a big impact. Using deep learning with video is currently limited because so much video is unlabeled and unstructured. Still, projections are that there will be a billion cameras worldwide by 2020, providing an over-abundance of data that demands the use of deep learning to make sense of it all. "There is a misconception that AI is meant to replace us, to make humans obsolete. AI is not replacing us. It is created by humans to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently," said Bakshi. He suggested that AI is equivalent to IA; Bakshi's abbreviation meaning "intelligence augmented." Johnmichael O’Hare (left) of the Hartford Police Department, and Tanmay Bakshi (right) discusses key security issues of the modern day The ability to scale AI applications using "distributed deep learning" and graphics processing unit (GPU) hardware is paving the way for greater use of deep learning in video applications. Adam Scraba, Global Business Development Lead at NVIDIA, outlined the trends that are making the current "Big Bang" of deep learning possible. He said it is "the most exciting time in tech history," with "software that can write its own software" now among the tools that make previously unsolvable problems now solvable. AI-driven intelligent video analytics can now achieve "super-human" results, he said. An Intelligent World To Combat Crime Instead of sitting for hours staking out a suspected drug dealer alone, entire investigations now take hours instead of days A success story about the game-changing capabilities of video data was supplied by Hartford, Conn.'s Capital City Crime Center (C4). The Hartford police department uses video data in a "predictive policing" approach. They have created an "intelligent world with smart policing to combat drug trafficking," according to C4 Supervisor Johnmichael O'Hare of the Hartford Police Department. Instead of sitting for hours staking out a suspected drug dealer, for example, video of a site can be analyzed to determine areas with higher levels of foot traffic that indicate drug buys. The result is investigations that take hours instead of days. Hartford incorporates several technologies, including ShotSpotter gunshot detection, Briefcam video synopsis and other systems, all tied together using the Milestone platform. More than 700 attendees make MIPS 2018 the largest such event ever, and exhibits by around 60 Milestone partner companies attest to the continuing expansion of the Milestone community. [Main image:Tanmay Bakshi (left) and Johnmichael O’Hare of the Hartford Police Department (right) discuss key security issues of the modern day]
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
With a century-long tradition for trade and commerce, the Hala Koszyki market hall was opened in 1908 on Koszykowa Street in Warsaw, Poland. Known as the ‘People’s Bazaar’, the Art Noveau-style building endured numerous social and political changes throughout its storied history. Between 2009 and 2016, Hala Koszyki was remodeled entirely according to a design by Polish star architects JEMS Architekci. Since its grand reopening in autumn 2016, Hala Koszyki has emerged as a major attraction for food connoisseurs in the Polish capital. The remodeled building retains some of the architectural layout of the historic original while offering international flavors in a variety of restaurants, bars, and food shops, plus several office spaces in a premium ambiance. Retail Solutions Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions Providing integrated security for Hala Koszyki called for a vendor that could solve three key challenges: First, the security system needed to blend in with the market’s stylish interior without attracting attention. Second, shop and restaurant personnel as well as office workers required specific access privileges to otherwise restricted areas. And third, building operators wanted a customisable system to meet the specific demands of Hala Koszyki’s shops, cafes, offices, parking spaces and other areas. Bosch received the contract as a one-stop supplier with a strong track record in large-scale retail solutions, also including the high-profile New Union Square shopping center and office tower in Downtown Warsaw. The experts equipped Hala Koszyki with video security, intrusion alarm, and access control systems. Intelligent Video Analytics The market hall’s video security system features moving and fixed IP-based cameras from Bosch throughout the premises. Integrated on the Bosch Video Management System (BVMS), the cameras are monitored by security staff in an on-site control room. For added security, cameras in critical areas feature Intelligent Video Analytics to recognize threats, unauthorized access, and suspicious behaviors automatically. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers Aside from greatly reducing the manpower needed to monitor video screens, the system also offers forensic search functionality for evidence in a user-friendly interface. In order to keep areas such as storage rooms and office facilities ‘off limits’ to unauthorized visitors, Bosch installed access control readers. Answering a key requirement, the access control system also logs the entry and exit times of employees, while keeping track of the current number of employees in the building. Complete Security Solution Safeguarding the Hala Koszyki against intruders, the integrated security solution features Professional Series intrusion detectors equipped with PIR (passive infrared) sensors. Combining these detectors with the intrusion panel Modular Alarm Platform MAP 5000 ensures continued operation in events such as short circuits or interruption of the power supply in a scalable system that can grow with customer requirements. The complete security solution for Hala Koszyki is managed by the Building Integration System (BIS). Overall, the integrated Bosch solution achieves the feat of accommodating Hala Koszyki’s various security and access requirements ‘under one roof’ while blending into the architecture, so end consumers are free to enjoy their shopping and dining experience undisturbed.
Cosmo Music was established in Richmond Hill, Ontario, Canada in 1968. Its current 56,000 sq ft store opened in 2008, making it the largest music instrument store in North America. It is also home to the Cosmopolitan Music Hall venue. Needing to replace a 20-year-old analog video system, Cosmo Music Vice President and COO Rudi Brouwers, started researching modern video management software (VMS). Initially he intended to purchase IP cameras and a basic VMS with the ability to record and playback. But Brouwers soon learned of the vast capabilities of modern systems. He turned his focus to finding one that went beyond basic video management to offer business intelligence. Identify Suspicious Customers Brouwers ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic In particular, he was interested in face recognition, which would enable Cosmo Music to identify suspicious customers to prevent shoplifting. Working with integrator Northern Alarm Protection Ltd. (NAP), Brouwers looked at a number of different systems, and ultimately decided on Axis cameras and Senstar’s Symphony VMS with its Face Recognition analytic. “I was sold on Symphony when I got to actually use it,” said Brouwers. “It floored me how easy it is to work, how straightforward it is. It is so user friendly it is unbelievable.” Brouwers likes several of Symphony’s core features, including: the ability to save video for up to six months (he had been hoping for 90 days) customization options (for example, recording only when motion is detected) ability to bookmark video the mobile app, which lets users connect to Symphony via a smartphone or tablet to view and playback video, control pan-tilt-zoom (PTZ) cameras, manage I/O devices, receive alarm notifications, and more. Face Recognition Analytic Before implementing Senstar’s Face Recognition video analytic, when a suspicious customer was identified through video surveillance, Brouwers would screen capture an image, email it to staff, and ask them to keep an eye out for that person. With Senstar’s Face Recognition video analytic, Brouwers can flag suspicious customers in Symphony. When that person enters the store again, Brouwers is automatically notified. One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up" Brouwers tested the analytic thoroughly and was amazed by its capabilities. “One of our staff had a full beard one day and it was shaved off the next day and the system still picked him up,” said Mr. Brouwers. “That’s what sold me on it.” Symphony and the Face Recognition analytic, deployed on Senstar’s R-Series network video recorder (NVR) hardware, have been running at Cosmo Music since April 2018 and Brouwers couldn’t be happier. Business Intelligence Applications “It’s everything I dreamed of and more,” he said. From an integrator perspective, NAP, who had significant VMS experience but never used Symphony, thinks the product is a great option for business intelligence applications. “Symphony is the right fit for any application that requires enhanced security such as analytics. It’s superior to many other systems out there,” said NAP President and CEO Dave Koziel. “From a deliver what is promised standpoint, it’s 12 out of 10 on the scale.” Senstar’s Face Recognition analytic adds an additional layer of security to any video surveillance deployment Identify known and unknown individuals Create allow and deny lists, and be alerted when someone on that list is identified Save time and resources with a robust search functionality that lets users look for registered and unknown people in video Search across multiple cameras, and filter search results by match score or date and time Two-factor authentication processes for access control applications
Cherokee Nation Entertainment (CNE) is the gaming and hospitality arm of the Cherokee Nation, operating multiple casinos and hotels across northeast Oklahoma, USA, including the prestigious Hard Rock Hotel & Casino Tulsa. Concerned that their security team was spending an overly large number of person-hours reviewing video recordings searching for a single person of interest, CNE sought to reduce the time it took to review security footage, so their security team could remain focused on proactive tasks, and optimize their day-to-day efficiency. CNE also wanted to obtain and assess accurate data on occupancy and visitor trends for business intelligence purposes. Furthermore, CNE wanted to be alerted to security-related events in real-time, in order to handle security issues as they developed. savVi’s Video Surveillance Solution CNE selected savVi, Agent Vi’s on premise video analytics solution, due to the wide range of video analytics capabilities that savVi offers. Over 1,000 savVi licenses were purchased, allowing cameras at CNE’s ten Oklahoma-based casinos to be enabled with different combinations of real-time event detection, video search and business intelligence capabilities. CNE utilizes the video search capability most widely – to enable rapid search through the surveillance video to pinpoint events of interest – and therefore video search capabilities are enabled on the majority of cameras at the sites. Business intelligence capabilities are mostly deployed around the various gaming machines, and at entrance and exit points, to show traffic patterns and real-time people counts. Real-time event detection capabilities are used largely for the high-security areas to ensure that CNE’s security team is informed regarding situations, as they unfold. savVi is deployed through integration with a range of Axis network cameras, primarily the AXIS P3225 and Q3505 fixed cameras, the AXIS P5635, Q6044 and Q6045 PTZ cameras, and for outdoor vehicle search, the AXIS Q3708 fixed camera with three sensors. CNE uses Milestone XProtect Corporate Video Management System (VMS), which is fully and seamlessly integrated with savVi, a Milestone Certified Solution. savVi’s video search capabilities allow for verification of personal injury claims by customers who may be trying to defraud the casino savVi’s Real-Time Event Detection savVi’s video search capabilities are of considerable importance to CNE. There is a prevailing need for the casinos to be able to swiftly locate specific events within masses of footage (“incident remediation” as it is known within the entertainment industry). Among other things, this allows for verification of personal injury claims by customers who may be trying to defraud the casino. Previously, the security team’s time was heavily occupied by observing hours of footage in search of a specific person or incident. savVi now enables CNE to run the search automatically, allowing far more effective use of the operators’ time, and reduced search time from as much as 16 hours for a single search, down to a matter of minutes. savVi’s real-time event detection capabilities are primarily used by CNE to ensure a safer and more secure environment within the casino parking facilities. By immediately alerting to any suspicious event, such as people loitering or cars moving in an unauthorized direction, the security team can monitor events and act accordingly as they unfold. savVi’s Heat Mapping Capabilities savVi also allows CNE to gather and analyze essential business intelligence data on occupancy and visitor trends. savVi delivers accurate headcounts, meaning that the security team is constantly aware of how many people are on-site and using the casino facilities. This provides essential knowledge in the case of an emergency where a facility might need to be evacuated, and also helps prevent over-crowding. By utilizing savVi’s heat mapping capabilities, CNE has knowledge of which areas of the casino are more heavily populated, and at what times. CNE can then leverage the data collected in a number of ways, including negotiating leasing deals for externally-owned casino equipment and knowing which internal locations require heavier investment of machines and personnel. This puts CNE well ahead of its competitors, as it is one of, if not the, first gaming company to employ Business Intelligence through video analytics. SavVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities" savVi’s Video Analytics Capabilities “It was savVi’s swift and effective video search that caught CNE’s attention when searching for an enhanced security solution, in particular due to the automated query ability,” said Joshua Anderson, Director of Surveillance and Technology, Cherokee Nation Entertainment. “We have been extremely impressed with savVi’s capabilities and the quality of its performance, and fully expect savVi to increase efficiencies and provide true ROI which will have a major impact on the bottom line.” “Cherokee Nation Gaming Commission’s approval of savVi’s deployment in CNE’s casinos is an endorsement of the great benefit that savVi’s video analytics capabilities offer to gaming concerns,” commented AJ Frazer, VP Business Development, Agent Vi. “Having selected to deploy the full range of savVi video analytics functionalities, savVi offers CNE valuable insights into the activities and customer experience at their multiple sites, benefitting both CNE and their customers.”
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”
Siemens Rail Automation is a supplier of signaling systems to the rail industry worldwide. The signaling system is fundamental to the safety of a rail network as it maintains safe separation and prevents collisions. Signalers rely on the safety critical signaling features to ensure safe operation in both normal and degraded conditions. Thorough initial training and regular refresher courses in a realistic environment is essential to maintaining the signalers’ competency and knowledge of operating procedures. Siemens collaborated with Matrox to implement a unique, IP-based simulation environment for their European-rail-network client with an innovative use of streaming and recording of multiple video feeds. Simulator For Signal Monitoring A simulator allows a trainer to vary scenarios—by changing the weather, introducing obstacles on the line, incidents in stations, broken-down trains, or other things that affect the scheduling of movement of rolling stock. Additional screens from other collaborative applications, such as timetabling, are displayed for the trainee The trainer needs to monitor a trainee’s reaction(s) to a particular scenario, as it transpires. To be able to view the entire session later, for analyzing, and pinpointing areas of improvement, each individual trainee’s performance needs to be recorded as well. The trainee operator’s signaling desk contains multiple monitors for the signaling application that shows, amongst other things, the state of the signals, dynamic speed limits, state of points on the track, and train positions. Additional screens from other collaborative applications, such as timetabling, are also displayed for the trainee. Trainers too have multiple screens where they define and manage the training scenario. Networked Training Ecosystem Siemens Rail Automation met their client’s need by leveraging Matrox’s video wall and enterprise encoding portfolio as building blocks to create an end-to-end, IP-based simulation system—all on the client’s 1 Gigabit Ethernet network. At the individual trainee stations, ‘operator’ workstations host a Matrox multi-display graphics card to power an eight-monitor, 4x2 desktop configuration. In the same PC system are two Matrox Maevex 6100 quad 4K enterprise encoder cards. Capable of simultaneously capturing, streaming, and recording up to four 4K inputs, Maevex 6100 in this case captures quad Full HD inputs, composites them as a single 4K signal, and streams them to a collaborative video wall. Doing so ensures that the time correlation between the individual screens is not lost—a cursor moving across a desktop from screen to screen is seen as it happens. One of the training objectives is to support the team working between the signallers and planners Monitoring Trainee Cursor Movement This is important for the trainer to get a realistic picture. A jerky or delayed cursor movement could be construed by the trainer as indecision or hesitation on the part of the trainee. If the cursor movement by the trainee—including between screens—is smooth, it is imperative for it to be seen live and recorded as being smooth. In addition to the above are three dual-monitor timetabling workstations and a quad-monitor trainer workstation, each with a Matrox graphics card and Maevex 6100 encoder card to stream desktop content to the collaborative display wall. The timetabling workstations are used by trainee timetable planners to make on-the-day changes. One of the training objectives is to support the team working between the signalers and planners. Reviewing Training Sessions On the video wall are 12 monitors in several arrangements that enable the trainer to control the simulation environment and monitor trainee signalers and planners. The video wall can also be used collaboratively to replay and review the training session. This is all from a single, low-footprint Blue Chip Ultima 2M system that hosts a combination of Matrox Mura IPX decoder cards and Matrox Mura MPX input/output video wall cards, which work together to seamlessly decode and display the various incoming streams. The rail network uses Matrox MuraControl for Windows video wall software to manage the incoming IP sources, presenting the information on the wall in a way that looks like the original setup at the trainee’s desk. Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters Product And Configuration Training These ‘video wall copies’ allow trainers and other decision makers to remotely, and instantaneously, see the trainee’s reaction to a given situation. Desktop views are easily switched between trainees. Additionally, Maevex 6100 allows training sessions to be simultaneously recorded to network storage from where the simulations are played back on demand to the individual trainee, or to other interested parties. To complete the offering, Matrox provided product and configuration training for Siemens personnel, onsite at Siemens Rail Automation’s headquarters. Successful Implementation Siemens Rail Automation has deployed the IP-based signaling simulator as part of a major project in a leading European-rail-network organization where it is performing in line with the rail industry’s stringent standards. Similar deployments for other clients are being planned. Using Matrox’s video wall and recording technologies has been instrumental to the successful implementation of this IP-based signaling simulator" Using the standard network to stream the various elements of the simulator in real time has offered many benefits to the client. The video wall displays copies of the trainer’s own screens, as well as a selected trainee’s screens. This IP-based implementation is easily scalable and allows multiple trainees to be participating in the same training session—with the trainer able to select which trainee to be overseeing at a given time. Andy Powell of Siemens Rail Automation says, “Using Matrox’s video wall and streaming and recording technologies has been instrumental to the successful implementation of this pioneering IP-based signaling simulator in our client’s organization. Without Matrox, this clearly wouldn’t have been achievable.”